SOC Analyst with SIEM and MUST have experience with LogRythm 4 Days Remote 1 days onsite in Harrisburg, PA (Relocation will work) Only USC at Harrisburg, Arkansas, USA |
Email: [email protected] |
From: Gaurav Gaur, DMS VISIONS INC [email protected] Reply to: [email protected] Hi, Hope you are doing well, Please find the job description given below and let me know your interest. Position : SOC Analyst with SIEM and MUST have experience with LogRythm 4 Days Remote 1 days onsite in Harrisburg, PA (Relocation will work) Only USC Location: 4 Days Remote 1 days onsite in Harrisburg, PA (Relocation ) Duration: 6+ months About Job: This position is responsible for developing and supporting all aspects of the Enterprise Security Offices (ESO) Security Operations Center (SOC). This includes acting as subject matter expert in Security Information & Event Management (SIEM) enrichment activities including new log source ingestion, developing alerts, and maintaining SIEM environment. This also includes monitoring and reporting on security tools (firewall, intrusion prevention, data loss prevention, AWS guard duty, etc.), identifying and coordinating responses to security related incidents, performing internal security reviews, and correlating security logs from multiple systems to identify potential security events. This position performs at a high level of complexity with a high level of proficiency and is an escalation contact and mentor for other team members. EDUCATION AND EXPERIENCE Minimum qualifications: Bachelors degree with five or more years of relevant work experience in information security administration and two to three years of hands-on experience in developing SIEM solutions or any combination of the equivalent combination of skills, experience, and/or certification(s). Advanced experience developing SIEM solution using LogRhythm including log source onboarding, use case development, smart response development, software patching and maintenance. Must have experience in monitoring AWS hosted environments using Guard Duty, Security Hub, Macie, etc. and ingesting log sources from AWS environments into the on-prem LogRhythm solution. Experience with any industry recognized SOAR product is plus but not required. Experience with advanced security and forensics. Strong technical background in computer systems, networks, and forensics. Broad knowledge of technical risks and tools used to prevent, detect, and remediate security issues. Strong understanding of the current vulnerabilities, response, and mitigation strategies used in information security. Strong understanding of privacy, security, and other regulations that are applicable. Ability to calculate regulatory, reputational, and other risks based on incident. Knowledge of security principles, risk assessment policies and standards, information security best practices, products and technologies, defense strategies, and network technologies. Experience with various operating systems with a focus on Microsoft Windows and Linux/Unix. Demonstrated ability to meet schedules and deadlines with thorough, accurate and quality work products. Ability to remain flexible in a demanding work environment and adapt to rapidly changing priorities. Effective skills with time management, prioritization, and attention to detail. Demonstrated analytical, critical thinking, and organizational skills. Possess a high level of integrity and ethics. Proficient use of Microsoft Office suite. If you are interested, please share your updated resume and suggest the best number & time to connect with you Thanks GAURAV GAUR DMS VISIONS INC. 972-645-9280 | dmsvisions.com/ [email protected] 4645 Avon Ln, Suite 210, Frisco, Texas 75033, US Keywords: Pennsylvania SOC Analyst with SIEM and MUST have experience with LogRythm 4 Days Remote 1 days onsite in Harrisburg, PA (Relocation will work) Only USC [email protected] |
[email protected] View all |
Tue Jul 23 23:12:00 UTC 2024 |